Presentation is loading. Please wait.

Presentation is loading. Please wait.

World-Leading Research with Real-World Impact!

Similar presentations


Presentation on theme: "World-Leading Research with Real-World Impact!"— Presentation transcript:

1 World-Leading Research with Real-World Impact!
CS 6393: Cyber Security Models and Systems CS 4593: Cyber Security Models and Systems (cross-listed) Course Introduction and Cyber Security Overview Ravi Sandhu L190118 Spring 2019 © Ravi Sandhu World-Leading Research with Real-World Impact!

2 Institute for Cyber Security
Cyber Security at UTSA Academic Colleges Human Development School of Data Science Sciences Business Engineering Arts Education ……. Research Centers Institute for Cyber Security Center for Infrastructure Assurance … Cyber Center for Security Analytics Open Cloud Institute National Security Collaboration Center NSA/DHS Certifications Human Development Cyber Operations Cyber Defense Research Cyber Defense Education A strategic priority since 2000 © Ravi Sandhu World-Leading Research with Real-World Impact!

3 ICS & C-SPECC Institute for Cyber Security (ICS)
Scope: All of Cyber Security NSF Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Scope: Secure Cloud Computing © Ravi Sandhu World-Leading Research with Real-World Impact!

4 ICS Mission and History
Sustained excellence in graduate-level sponsored research Graduated to a self-sustaining operation Founded by start-up funding from State of Texas Major expansion by winning NSF C-SPECC grant In collaboration with: College of Engineering College of Business College of Education Open Cloud Institute Cyber Center for Security & Analytics Partnership with 4 NISD High Schools: Harlan, Woodson, Taft, Business Careers Established world class laboratories for: Secure cloud computing & Malware research © Ravi Sandhu World-Leading Research with Real-World Impact!

5 Natural vs Cyber Science
Elephant Problem Cyber-Elephant Problem Applied vs Foundational Science: Cyber-elephants require applied and foundational combined Present vs Future Focus: Rapidly evolving cyber-elephants require future focus © Ravi Sandhu World-Leading Research with Real-World Impact!

6 Holistic Cyber Security
Objectives POLICY ATTACKS What? Why? Enforce Enable Defend Respond PROTECT DETECT Complement How? Mechanisms © Ravi Sandhu World-Leading Research with Real-World Impact!

7 Control of read and write is fundamental to all three
Security Objectives Control of read and write is fundamental to all three INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact!

8 Covers privacy and intellectual property protection
Security Objectives USAGE purpose Covers privacy and intellectual property protection INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact!

9 World-Leading Research with Real-World Impact!
Security Objectives USAGE purpose USAGE INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact!

10 World-Leading Research with Real-World Impact!
Security is Dynamic “My dear, here we must run as fast as we can, just to stay in place. And if you wish to go anywhere you must run twice as fast as that.” ― Lewis Carroll, Alice in Wonderland © Ravi Sandhu World-Leading Research with Real-World Impact!

11 World-Leading Research with Real-World Impact!
Low Assurance Systems The ATM (Automatic Teller Machine) system is secure enough global in scope Similarly on-line banking e-commerce payments © Ravi Sandhu World-Leading Research with Real-World Impact!

12 High Assurance Systems
US President’s nuclear football Secret formula for Coca-Cola © Ravi Sandhu World-Leading Research with Real-World Impact!

13 World-Leading Research with Real-World Impact!
Limits to Security Analog hole Inference Side channels Insider threat Detection is impossible Protection is impossible ….. © Ravi Sandhu World-Leading Research with Real-World Impact!

14 ICS Major Research Thrusts
TECHNOLOGIES Access Control Policy Malware Detection and Forensics Blockchain Artificial Intelligence Machine Learning Data Provenance …. APPLICATION DOMAINS Cloud Computing Internet of Things (IoT) Social Networks Big Data Mobile Platforms Enterprise Insider Threat Scientific Infrastructure …. Goal: Broaden and Deepen © Ravi Sandhu World-Leading Research with Real-World Impact!


Download ppt "World-Leading Research with Real-World Impact!"

Similar presentations


Ads by Google